EP3671254A1 - Service d'avertissement en temps réel de mystification/brouillage/transplexion - Google Patents

Service d'avertissement en temps réel de mystification/brouillage/transplexion Download PDF

Info

Publication number
EP3671254A1
EP3671254A1 EP18214724.9A EP18214724A EP3671254A1 EP 3671254 A1 EP3671254 A1 EP 3671254A1 EP 18214724 A EP18214724 A EP 18214724A EP 3671254 A1 EP3671254 A1 EP 3671254A1
Authority
EP
European Patent Office
Prior art keywords
pieces
radio
instance
positioning
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP18214724.9A
Other languages
German (de)
English (en)
Inventor
Jari Syrjärinne
Lauri Wirola
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Here Global BV
Original Assignee
Here Global BV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Here Global BV filed Critical Here Global BV
Priority to EP18214724.9A priority Critical patent/EP3671254A1/fr
Priority to US16/723,451 priority patent/US11480652B2/en
Publication of EP3671254A1 publication Critical patent/EP3671254A1/fr
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/20Countermeasures against jamming
    • H04K3/22Countermeasures against jamming including jamming detection and monitoring
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/021Auxiliary means for detecting or identifying radar signals or the like, e.g. radar jamming signals
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/02Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
    • G01S13/06Systems determining position data of a target
    • G01S13/08Systems for measuring distance only
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0252Radio frequency fingerprinting
    • G01S5/02521Radio frequency fingerprinting using a radio-map
    • G01S5/02524Creating or updating the radio-map
    • G01S5/02527Detecting or resolving anomalies in the radio frequency fingerprints of the radio-map
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/542Event management; Broadcasting; Multicasting; Notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/60Jamming involving special techniques
    • H04K3/65Jamming involving special techniques using deceptive jamming or spoofing, e.g. transmission of false signals for premature triggering of RCIED, for forced connection or disconnection to/from a network or for generation of dummy target signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/60Jamming involving special techniques
    • H04K3/68Jamming involving special techniques using passive jamming, e.g. by shielding or reflection
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/13Receivers
    • G01S19/21Interference related issues ; Issues related to cross-correlation, spoofing or other methods of denial of service

Definitions

  • the invention relates to the field of GNSS-based and non-GNSS based radio positioning and more specifically to identifying potentially manipulated radio signals and/or radio signal parameters.
  • Satellite signal based positioning technologies which are mainly used outdoors, are usually not suited to deliver a satisfactory performance when used for indoor positioning, since satellite signals of global navigation satellite systems (GNSS), like the global positioning system (GPS) or the Galileo system, do not penetrate through walls and roofs strongly enough for an adequate signal reception indoors. Thus, these positioning technologies are not able to deliver a performance indoors that would enable seamless, equal and accurate navigation experience outdoors and indoors.
  • GNSS global navigation satellite systems
  • GPS global positioning system
  • Galileo system Galileo system
  • Non-GNSS based radio positioning systems for indoor and outdoor positioning have been developed and commercially deployed during the past years. Examples comprise systems that are based on pseudolites, which are ground based GPS-like short-range beacons, ultrasound positioning systems, Bluetooth Low Energy (BLE) based positioning systems, cellular network based positioning systems and wireless local area network (WLAN) based positioning systems.
  • pseudolites which are ground based GPS-like short-range beacons
  • ultrasound positioning systems GPS-like short-range beacons
  • BLE Bluetooth Low Energy
  • cellular network based positioning systems cellular network based positioning systems
  • WLAN wireless local area network
  • Such a non-GNSS based radio positioning system may be divided in at least three stages: an installation stage, a training stage and a positioning stage.
  • dedicated positioning support radio nodes e.g. Bluetooth beacons
  • a non-GNSS based radio positioning system may make use of existing radio nodes like WLAN access points or cellular network nodes as positioning support radio nodes.
  • the data may be collected in the form of radio fingerprint observation reports that are based on measurements by mobile devices.
  • a radio fingerprint observation report may indicate an observation position and radio signal parameters obtained as a result of measurements taken from the radio interface when scanning for observable radio signals at the observation position.
  • the observation position may be for example GNSS based, sensor-based, or manually inputted.
  • Measurements taken from the radio interface may comprise, by way of example, measured received signal strengths and identifiers of radio nodes (e.g. Bluetooth beacons, WLAN access points, base stations of a cellular network) transmitting the radio signals observable at the observation position.
  • the training may be a continuous background process, in which mobile devices of a large number of consumers are continuously reporting collected fingerprint observation reports to a server.
  • crowd-sourcing is a background process that does not directly benefit the device user, it is desirable that the crowd-sourcing process only consumes limited resources of the device.
  • mobile devices may be used for collecting radio fingerprint observation reports in a systematic manner. Collected reports may be uploaded to a database in a positioning server or in a positioning cloud, where algorithms may be run to generate radio models of positioning support devices (e.g. Bluetooth beacons, WLAN access points, base stations of a cellular network) and/or radio maps for positioning purposes.
  • positioning support devices e.g. Bluetooth beacons, WLAN access points, base stations of a cellular network
  • a mobile device may estimate its current position based on own measurements taken from the radio interface and on information or a subset of information that is available from the training stage.
  • Radio model information or radio map information that has been generated in the training stage may be provided to mobile devices by a positioning server via the Internet as assistance information for use in position estimation.
  • radio model information and/or radio map information may be stored in a positioning server to which the mobile devices may connect to via the Internet for obtaining a position estimate.
  • Non GNSS-based radio positioning systems e.g. Bluetooth, WLAN and cellular based radio positioning systems
  • Non GNSS-based radio positioning systems may be affected by manipulating radio signals that are used for positioning purposes during the positioning stage.
  • Manipulation techniques may for example be spoofing or jamming of such radio signals:
  • an object of the present invention to provide a solution for such sporadic incidents so that such manipulation techniques are preventable in positioning.
  • a method comprising:
  • This method may for instance be performed and/or controlled by an apparatus, for instance a mobile device, e.g. a mobile terminal, a smartphone, a tablet, a wearable, an IoT device.
  • a mobile device e.g. a mobile terminal, a smartphone, a tablet, a wearable, an IoT device.
  • the method may be performed and/or controlled by using at least one processor of the mobile device.
  • the method may be performed and/or controlled by a module or component executed by such mobile device.
  • a computer program when executed by a processor causing an apparatus, for instance a server or a server cloud, to perform and/or control the actions of the method according to the first exemplary aspect.
  • the computer program may be stored on computer-readable storage medium, in particular a tangible and/or non-transitory medium.
  • the computer readable storage medium could for example be a disk or a memory or the like.
  • the computer program could be stored in the computer readable storage medium in the form of instructions encoding the computer-readable storage medium.
  • the computer readable storage medium may be intended for taking part in the operation of a device, like an internal or external memory, for instance a Read-Only Memory (ROM) or hard disk of a computer, or be intended for distribution of the program, like an optical disc.
  • ROM Read-Only Memory
  • an apparatus configured to perform and/or control or comprising respective means for performing and/or controlling the method according to the first exemplary aspect
  • the means of the apparatus can be implemented in hardware and/or software. They may comprise for instance at least one processor for executing computer program code for performing the required functions, at least one memory storing the program code, or both. Alternatively, they could comprise for instance circuitry that is designed to implement the required functions, for instance implemented in a chipset or a chip, like an integrated circuit In general, the means may comprise for instance one or more processing means or processors.
  • an apparatus comprising at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause an apparatus, for instance the apparatus, at least to perform and/or to control the method according to the first exemplary aspect.
  • the above-disclosed apparatus according to any aspect (e.g. the first exemplary aspect) of the invention may be a module or a component for a device, for example a chip.
  • the disclosed apparatus according to any aspect of the invention may be a device, for instance a server or server cloud.
  • the disclosed apparatus according to any aspect of the invention may comprise only the disclosed components, for instance means, processor, memory, or may further comprise one or more additional components.
  • a method comprising:
  • This method may for instance be performed and/or controlled by an apparatus, for instance a server.
  • this method may be performed and/or controlled by more than one apparatus, for instance a server cloud comprising at least two servers.
  • the method may be performed and/or controlled by using at least one processor of the server or the server cloud.
  • the method may be performed and/or controlled by a module or component executed by such as server or server cloud.
  • a computer program when executed by a processor causing an apparatus, for instance a server, to perform and/or control the actions of the method according to the second exemplary aspect
  • the computer program may be stored on computer-readable storage medium, in particular a tangible and/or non-transitory medium.
  • the computer readable storage medium could for example be a disk or a memory or the like.
  • the computer program could be stored in the computer readable storage medium in the form of instructions encoding the computer-readable storage medium.
  • the computer readable storage medium may be intended for taking part in the operation of a device, like an internal or external memory, for instance a Read-Only Memory (ROM) or hard disk of a computer, or be intended for distribution of the program, like an optical disc.
  • ROM Read-Only Memory
  • an apparatus configured to perform and/or control or comprising respective means for performing and/or controlling the method according to the second exemplary aspect
  • the means of the apparatus can be implemented in hardware and/or software. They may comprise for instance at least one processor for executing computer program code for performing the required functions, at least one memory storing the program code, or both. Alternatively, they could comprise for instance circuitry that is designed to implement the required functions, for instance implemented in a chipset or a chip, like an integrated circuit In general, the means may comprise for instance one or more processing means or processors.
  • an apparatus comprising at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause an apparatus, for instance the apparatus, at least to perform and/or to control the method according to the second exemplary aspect.
  • the above-disclosed apparatus according to any aspect (e.g. the second exemplary aspect) of the invention may be a module or a component for a device, for example a chip.
  • the disclosed apparatus according to any aspect of the invention may be a device, for instance a mobile device.
  • the disclosed apparatus according to any aspect of the invention may comprise only the disclosed components, for instance means, processor, memory, or may further comprise one or more additional components.
  • a system comprising: a first apparatus according to the first exemplary aspect of the present invention as disclosed above, configured to perform and/or control the method of the first exemplary aspect of the present invention, and a second apparatus according to the second exemplary aspect of the present invention as disclosed above, configured to perform and/or control the method of the second exemplary aspect of the present invention.
  • the first apparatus and the second apparatus may in particular be configured to perform the respective methods according to the first and the second exemplary aspects of the present invention together.
  • the method according to the first exemplary aspect of the present invention (performed and/or controlled by the at least one mobile device) and the method according to the second exemplary aspect of the present invention (performed and/or controlled by at least one apparatus, e.g. a server or a server cloud) may for instance be performed and/or controlled together in real-time.
  • One or more pieces of threat information indicative of a data set enabling positioning based on radio signals sent by a respective radio node are obtained.
  • the one or more pieces of threat information may for instance be obtained, e.g. by receiving them.
  • the one or more pieces of threat information may for instance be received from at least one apparatus, e.g. a server or a server cloud performing and/or controlling the method according to the second exemplary aspect of the present invention.
  • the data set is further indicative of one or more parameters based on which said positioning is performed and/or controlled and which positioning is considered to be at least partially unexpected.
  • a radio node based on which signals positioning is performed and/or controlled, wherein said positioning is considered to be at least partially unexpected, may for instance also be referred to as affected radio node.
  • a respective threat information may thus be indicative of at least one affected radio node that is potentially manipulated. Additionally or alternatively, at least partially based on a respective threat information, such at least one affected radio node may for instance be determined. Additionally or alternatively, a respective obtained threat information may for instance be output, e.g. to one or more further mobile devices, e.g. performing and/or controlling the method according to the first exemplary aspect of the present invention. At least partially based on a respective threat information, the at least one mobile device may for instance be enabled e.g.
  • a respective threat information may for instance be indicative of one or more satellites (e.g. identified by a corresponding satellite identifier), which may enable positioning, which is considered to be at least partially be unexpected. All of the features described with respect to an affected radio node may for instance equally apply, as far as reasonable, to such satellites being utilized in a positioning.
  • a respective threat information may for instance be in the form of an alert that may for instance be output (e.g. visually displayed, acoustically output, and/or haptically signaled) to a respective user of the at least one mobile device which has obtained the respective threat information.
  • the respective threat information may for instance be in another form of an alert that may for instance not be displayed to a respective user of the at least one mobile device which has obtained the respective threat information, but which may for instance at least partially automatically be considered in case e.g. determining of a position at least partially on the respective threat information is performed and/or controlled, e.g. by being utilized in a positioning.
  • a respective threat information comprises one or more of the following information i) to iv) associated with at least one affected radio node:
  • the method further comprises:
  • a respective threat information may for instance be obtained, e.g. by receiving the respective threat information from another mobile device, e.g. having locally determined (e.g. generated) a threat information.
  • a threat information may for instance be obtained from one or more mobile devices located in the vicinity of the at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention.
  • the obtained one or more pieces of threat information may for instance be stored e.g. for later use in a/the positioning.
  • the stored one or more pieces of threat information may for instance be utilized, e.g. to identify such one or more affected radio nodes, and/or further to perform and/or control one or more actions at least partially based on the one or more pieces of threat information.
  • the one or more pieces of threat information may for instance be stored in a memory, e.g. comprising a database.
  • a memory may for instance be comprised by or be connectable to the at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention.
  • a database may for instance be maintained. The maintaining of such a database may for instance be referred to as keeping the database.
  • the database, or the one or more pieces of threat information stored in the database may for instance be available upon a certain request so that e.g. independent upon a communication connection information of the database can be retrieved to be further utilized, e.g.
  • a retrieving one or more pieces of threat information may for instance be performed and/or controlled by the at least one mobile device performing and/or controlling the method according to the first exemplary aspect, while one or more further steps of the method according to the first exemplary aspect of the present invention are performed and/or controlled.
  • the one or more pieces of threat information may for instance be obtained by one or more of the following steps (i) or (ii):
  • the respective threat information may for instance be obtained by receiving the threat information, e.g. from a server, or from an entity that is different from the server that relays the threat information to the at least one mobile device.
  • the warning information may for instance be obtained by a push- or a pull method, such as an API (Application Programming Interface).
  • the push-method enables one or more pieces of respective threat information to be pushed onto the at least one mobile device,
  • the push of a respective threat information may for instance enable that the respective threat information is obtained by the at least one mobile device in real-time, or near real-time.
  • the delay between a knowing of a potential threat and one or more mobile devices (e.g. the at least one mobile device) obtaining a respective threat information indicative of the potential threat is minimized.
  • a pull-method enables the at least one mobile device to (e.g. actively) retrieve a respective threat information, e.g. from at least one apparatus (e.g. a server or a server cloud performing and/or controlling the method according to the second exemplary aspect of the present invention), e.g. by sending a request for obtaining one or more pieces of threat information. Then, a respective obtained threat information may for instance be received and utilized (e.g. used) by the at least one mobile device in a/the positioning.
  • Such a pull-method may for instance be subject to more delay between a knowing of a potential threat and one or more respective mobile devices obtaining a corresponding threat information, than a delay by obtaining a corresponding threat information via a push-method.
  • An API may for instance define an interface, which may for instance be used based on one or more predefined commands. This may for instance enable an interaction of the at least one mobile device via the API to obtain the one or more pieces of threat information.
  • the one or more pieces of threat information may for instance be obtained by a push method.
  • a push method may for instance enable that the one or more pieces of threat information trigger a notification to a respective user of the at least one mobile device.
  • the obtaining of the one or more pieces of threat information may for instance be initiated by at least one apparatus, e.g. a server or a server cloud performing and/or controlling the method according to the second exemplary aspect of the present invention.
  • a server or server cloud performing and/or controlling the method according to the second exemplary aspect of the present invention.
  • This may also be referred to as server push.
  • a server or server cloud may for instance send a request to transmit the one or more pieces of threat information to the at least one mobile device, to which a user of the at least one mobile device has given his consent prior to receiving such a request.
  • the one or more pieces of threat information may for instance be transmitted from such a server or server cloud to the at least one mobile device.
  • the one or more pieces of threat information are obtained via at least one of a REST- (Representational State Transfer)-, a MQTT (Message Queuing Telemetry Transport)-, a CoAP (Constrained Application Protocol)-API, or a combination thereof (to name but a few non-limiting examples). All of them enable the at least one mobile device to obtain (e.g. receive) the one or more pieces of threat information in real-time, or near real-time, with a very short delay (e.g. no delay at all in case of real-time), thus, between a knowing of a potential threat and one or more mobile devices (e.g. the at least one mobile device) obtaining a respective threat information indicative of the potential threat.
  • a REST- Real State Transfer
  • MQTT Message Queuing Telemetry Transport
  • CoAP Constrained Application Protocol
  • the mobile device may for instance be portable (e.g. weigh less than 5, 4, 3, 2, or 1 kg).
  • the mobile device may for instance comprise or be connectable to a display for displaying information, e.g. a route that is guided/navigated to a user, to name but one non-limiting example.
  • the mobile device may for instance comprise or be connectable to means for outputting sound, e.g. in the form of spoken commands or information.
  • the mobile device may for instance comprise or be connectable to one or more sensors for determining the devices position, such as for instance a GNSS receiver, in the form of a GPS and/or Galileo receiver.
  • the mobile device may for instance comprise or be connectable to one or more sensors, e.g.
  • the mobile device may for instance comprise or be connectable to a receiver and/or a transmitter (e.g. a transceiver) for receiving and/or sending data and/or information.
  • the mobile device may comprise one or more radio receivers (e.g. radio transceivers, e.g. cellular radio transceivers), which may for instance enable the method according to the first exemplary aspect of the present invention to be performed and/or controlled.
  • the mobile device may for instance be suitable for outdoor and/or indoor navigation respectively positioning.
  • the disclosed method(s) according to the first and/or second exemplary aspect of the present invention may be part of a GNNS-based and/or a non-GNSS based radio positioning system, e.g. GNNS-based and/or a non-GNSS based radio positioning system as disclosed above.
  • the at least one mobile device may be enabled for or support such a GNNS-based and/or a non-GNSS based radio positioning system. This may be understood to mean that the at least one mobile device is configured to estimate (e.g. determine) or to cause estimating (e.g. determining) its position at least partially based on a (e.g. gathered) radio measurement comprising or representing radio signal parameters of one or more radio signals (e.g.
  • the at least one mobile device is configured to estimate (e.g. determine) or to cause estimating (e.g. determining) its position at least partially based on a GNSS satellite positioning system, thus, e.g. based on (e.g. gathered) signals of respective satellites comprised by such a GNSS satellite positioning system.
  • Estimating (e.g. determining) of a position of the at least one mobile device at least partially based on (a) radio signal parameter(s) may be understood to mean that the estimating is performed as a function of the radio signal parameter(s).
  • the estimating may optionally depend on further information like a radio map.
  • a radio map may be configured to enable one or more mobile devices (e.g. the at least one mobile device) to estimate their position at least partially based on this radio map when the respective mobile devices are located in the area covered by the radio map.
  • the radio map is represented by radio map information which may be provided (e.g. transmitted) by a positioning server to the respective mobile devices and/or which may be hold available by the respective mobile devices (e.g. stored in memory means of the mobile device(s)).
  • the radio map contains or represents a respective radio model for a plurality of radio nodes transmitting (e.g.
  • the radio map may contain or represent, e.g. for each floor of the venue, a respective radio model for a plurality of radio nodes transmitting (e.g. broadcasting) radio signals that are observable on the respective floor of the venue.
  • Such a radio node may be a specific WiFi, Bluetooth, cellular, or a combination thereof enabled radio node.
  • a specific radio node of one or more radio nodes may for instance be identified by its identifier (ID).
  • ID the identifier of at least one radio node of the one or more radio nodes may for instance be stored in an accessible database, e.g. as disclosed above, or via the Internet, to identify the respective radio node.
  • the position of the respective radio node may for instance be determined.
  • the respective identifier may be associated with its current position (e.g. in the form of coordinates; x- and y-coordinates or latitude- and longitude-coordinates) so that the position of the respective radio node is at least determinable at least partially based on its identifier.
  • radio node(s) of one or more radio nodes may for instance be used for indoor positioning and/or floor detection, e.g. according to Bluetooth- and/or BLE-specification, or may for instance be a WiFi access point for indoor positioning and/or floor detection, e.g. according to the WLAN- (Wireless Local Area Network) specification).
  • WLAN- Wireless Local Area Network
  • Such (a) radio node(s) of one or more radio nodes may for instance comprise or be connectable to a transceiver, e.g. according to the BT-, BLE, and/or WLAN-specification to provide wireless-based communication.
  • a transceiver e.g. according to the BT-, BLE, and/or WLAN-specification to provide wireless-based communication.
  • Each radio node of the one or more radio nodes may for instance use such a transceiver for transmitting and/or broadcasting one or more radio signals, e.g. comprising or containing one or more information and/or potentially manipulated radio signals and/or radio signal parameters.
  • a respective radio model for a respective radio node may be understood to represent at least the expected radio coverage of the respective radio node (e.g. on a certain floor of a building).
  • the radio model of such a radio node may describe the coverage area (e.g. on a certain floor of a venue) within which radio signals transmitted or triggered to be transmitted by this radio node are expected to be observable.
  • An example for such a radio model is a radio image representing an expected radio signal strength field of the radio signals transmitted or triggered to be transmitted by this radio node.
  • the real radio coverage of such a radio positioning support device may however deviate from the expected radio coverage as described by such a radio model.
  • Such one or more radio signals may be terrestrial radio signals.
  • a terrestrial radio signal examples are a Bluetooth signal, a BLE signal, a cellular network signal or a WLAN signal.
  • the Bluetooth standards are specified by the Bluetooth Special Interest Group and are presently available under https://www.bluetooth.com/.A cellular network may for example be a mobile phone network like a 2G/3G/4G/5G cellular communication network.
  • the 2G/3G/4G/5G cellular radio communication standards are developed by the 3GPP and presently available under http://www.3gpp.org/.
  • WLAN is for example specified by the standards of the IEEE 802.11 family (http://www.ieee.org/).
  • a radio signal parameter of a certain radio signal may for example be obtained by the at least one mobile device as a scanning result when scanning for observable radio signals at a certain position (e.g. for estimating its position).
  • a radio signal may be understood to be observable at a certain position if the radio signal is receivable with a minimum quality (e.g. a minimum signal-to-noise ratio and/or a minimum signal power, e.g. at least -90 dbm or -95 dbm) at this position.
  • a respective mobile device e.g. the at least one mobile device
  • the determined radio signal parameters may then for example be obtained as scanning results.
  • a radio signal parameter of a certain radio signal may be understood to be at least one of (1) an information contained in the radio signal and (2) a representation (e.g. an indicator or a value) of a physical quantity (e.g. a received signal strength) of the radio signal. Accordingly, a radio signal parameter may be determined by at least one of (1) extracting information contained in the radio signal and (2) measuring a physical quantity (e.g. a received signal strength) of the radio signal.
  • radio node(s) transmits potentially manipulated radio signals and/or radio signal parameters
  • it is referred to such (a) radio node(s) herein as affected radio node(s).
  • an action may be taken when e.g. the at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention is located (or e.g. arriving) again in the affected area within which the affected radio node is located, or when detecting a radio node, which has previously been detected to be spoofed, jammed, and/or meaconed.
  • the action may enable the prevention of a position to be determined (e.g. estimated) which is considered to be at least partially unexpected, in case said positioning is at least partially based on the radio signal(s) or radio signal parameter(s) of the affected radio node.
  • potentially manipulated radio signals and/or radio signal parameters may be used for spoofing, jamming, meaconing, or a combination thereof.
  • spoofing, jamming, meaconing, or a combination has been detected, providing information indicative of corresponding details in the form of one or more pieces of threat information to one or more mobile devices (e.g. the at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention) in real-time or near real-time can be achieved.
  • At least one respective threat information of the one or more pieces of threat information may for instance be stored in a memory, e.g. a non-volatile memory.
  • a memory may for instance be comprised by or be connectable to the at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention.
  • the at least one respective threat information may for instance be stored in a database comprised by the memory.
  • a database may for instance be maintained. The maintaining of such a database may for instance be referred to as keeping the database.
  • outdated threat information comprised or represented by the database may for instance be removed (e.g. cleaned), and/or one or more new pieces of threat information may for instance be added to the database.
  • the one or more parameters of a respective data set of the one or more pieces of threat information comprises or represents one or more of the following parameters i) to v):
  • the data set is further indicative of one or more parameters based on which said positioning is performed and/or controlled and which is considered to be at least partially unexpected.
  • a respective (affected) radio node comprised or represented by the one or more pieces of threat information may further be associated with (e.g. linked to) a radio-type information.
  • a radio-type information may for instance be indicative of that a specific type of radio (e.g. WiFi, Bluetooth, Cellular, or a combination thereof) is under influence. Thus, it could be potentially manipulated.
  • a respective affected radio node of one or more radio nodes and/or a respective area of one or more areas (and e.g. comprising at least one affected radio node, thus, in which at least one affected radio node is located) as comprised by or represented by the one or more pieces of threat information may further be associated with (e.g. linked to) a radio-type information.
  • a respective identifier of a respective radio node may for instance be associated with (e.g. linked to) one or more further pieces of information, e.g. wherein such an information may for instance be a radio-type information.
  • such a radio-type information associated with a respective radio node and/or associated with at least one area of one or more areas as comprised or represented by the one or more pieces of threat information may be used to filter (e.g. all of) the other radio node(s) and/or area(s) comprised in the one or more pieces of threat information. For instance, in case a certain radio node is affected - thus considered to be potentially manipulated - at least partially based on the associated radio-type information, it may for instance be enabled to identify (e.g. all of) the other radio node(s) using the same radio-type that are comprised or represented by the obtained one or more pieces of threat information, so that e.g. those further identified radio nodes may be e.g. blocked in the positioning to be performed and/or controlled as well.
  • the radio-type information is indicative of one or more of the following types i) to iv]:
  • radio signals may for instance be identified to be potentially manipulated:
  • one or more respective radio nodes comprised or represented by the one or more pieces of threat information may for instance be one or more of the following types of radio nodes:
  • the Bluetooth beacons may comprise a Bluetooth and/or BLE radio Interface, which includes at least a Bluetooth and/or BLE transmitter.
  • the Bluetooth and/or BLE transmitter may also be a part of a Bluetooth and/or BLE transceiver of a respective (communication) interface.
  • the Bluetooth and/or BLE radio interface may be configured to transmit Bluetooth and/or BLE radio signals.
  • a Bluetooth beacon that is employed for the invention may be any kind of Bluetooth beacon complying with any present or future standard.
  • Bluetooth beacons may be easily installed as dedicated position support radio nodes at various installation positions and require little to no maintenance.
  • a plurality of Bluetooth beacons may be easily distributed across a certain area and may cover a certain area (e.g. the area of the environment represented by the radio map and/or of the above disclosed system) with Bluetooth radio signals transmitted (e.g. broadcasted) by the Bluetooth beacons.
  • Bluetooth technologies are supported by many mobile devices by default such as most smartphones, most tablet computers, most notebook computers, most smart watches and most smart bands, most loT device, etc. Using Bluetooth beacons and/or BLE beacons may thus have the effect that many mobile devices may use such non-GNSS based radio positioning system without any adaptation of hardware.
  • the Bluetooth beacons may be stand-alone devices or be integrated into or attached to some other device. Bluetooth beacons, in particular in low energy mode (BLE), require comparably little energy and the use of Bluetooth low energy may enable a positioning with limited energy consumption at all involved devices.
  • BLE low energy mode
  • radio nodes than variations of Bluetooth beacons may be used as well as dedicated position support radio nodes, for instance tags or other devices that are configured to transmit ultra-wideband (UWB) signals or any wireless radio signals that might emerge in the future.
  • UWB ultra-wideband
  • radio nodes like WLAN access points or cellular network nodes may be used as positioning support radio nodes alternatively or additionally.
  • a WLAN access point may comprise a WLAN radio interface, which for example includes a WLAN transceiver.
  • the WLAN radio interface may be configured to transmit and/or receive WLAN radio signals. Accordingly, the radio signal transmitted by such an access point and/or router of a WLAN may be a WLAN radio signal.
  • WLAN is for example specified by the standards of the IEEE 802.11 family (http://www.ieee.org/).
  • a cellular network node may be a base transceiver station (BTS) or a node-B of a cellular network like a 2G/3G/4G/5G cellular communication network.
  • a cellular network node may comprise a cellular radio interface, which for example includes a 2G/3G/4G/5G transceiver. Accordingly, the radio signal transmitted by such cellular network node may be a 2G/3G/4G/5G cellular radio signal.
  • a base station of a (wireless) LPWAN may for instance enable one or more mobile devices to join (e.g. connect) to the base station.
  • a base station of such a LPWAN may for instance be suitable for outdoor and/or indoor environments.
  • a base station of a LPWAN may for instance enable a wireless communication network according to Sigfox, LoRa (Long Range), and NB-IoT (Narrow Band-Internet of Things) specification, to name but a few non-limiting examples.
  • such a radio-type information associated with at least one radio node and/or with at least one area may be used to filter (e.g. all of) the other radio node(s) and/or area(s) comprised or represented by the obtained one or more pieces of threat information.
  • a respective threat information of the one or more pieces of threat information is indicative of at least one of spoofing, jamming, and meaconing threat to the positioning.
  • the at least one mobile device may for instance be enabled to determine how to avoid that a positioning that is to be performed and/or controlled by the at least one mobile device is manipulated by at least one of spoofing, jamming, and meaconing.
  • the at least one mobile device may for instance be enabled to determine the at least one affected radio node and/or an area in which the at least one affected radio node is located.
  • the positioning may for instance be intended to be performed and/or controlled by the at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention.
  • the method further comprises:
  • the at least one affected radio node may for Instance be determined e.g. by extracting information identifying the at least one affected radio node out of the obtained (e.g. received) one or more pieces of threat information.
  • the at least one affected radio node may for instance be identified based on an identifier that may for instance be comprised or represented by the one or more pieces of threat information.
  • a specific radio node of one or more radio nodes may for instance be identified by its identifier (ID).
  • ID the identifier of at least one radio node may for instance be stored in a database to identify the respective radio node, which may for instance be accessible by the at least one mobile device.
  • the position of the respective radio node may for instance be determined.
  • the respective identifier may be associated with its current position (e.g. in the form of coordinates; x- and y-coordinates or latitude- and longitude-coordinates) so that the position of the respective radio node is at least determinable at least partially based on its identifier.
  • the position of a respective radio node may for instance be stored in such a database as well.
  • a database may for instance be comprised by or connectable to a server or server cloud, so that the database may for instance be accessible via a communication network (e.g. the Internet).
  • the determined at least one affected radio node may for instance be blocked from being utilized in the positioning. For instance, this may enable to avoid that the at least one affected radio node respectively one or more radio signals sent by the at least one affected radio node are considered in the positioning.
  • the method further comprises:
  • one or more mobile device(s) might also have stored a local database, e.g. in a memory comprised by or connectable (to the at least one mobile device).
  • a local database may for instance store the one or more pieces of threat information, and/or the at least one affected radio node, which may for instance be determinable, to name but a few non-limiting examples.
  • the mobile device(s) may for example selectively replace records, e.g. in the local database, by comparing timestamp information, e.g. newer information respective data replaces old(er) information respective data, to the ones stored in the database.
  • timestamp information e.g. newer information respective data replaces old(er) information respective data
  • the checking further comprises:
  • such one or more pieces of threat information may for instance comprise or represent information indicative of a position and/or an area in which one or more threats (e.g. manipulation such as spoofing, jamming, and/or meaconing) could occur.
  • one or more pieces of threat information there may for instance be comprised or represented information indicative of one or more capabilities (such as radio-type and/or frequency-band, to name but a few non-limiting examples) which could be subject to one or more threats (e.g. manipulation such as spoofing, jamming, and/or meaconing).
  • the at least one mobile device may for instance check whether or it is located within the vicinity of the one or more threats, and/or whether or not one or more capabilities of the at least one mobile device match to one or more capabilities which could potentially be subject to one or more threats. For instance, in case the result of such a checking is that e.g. the at least one mobile device is not located within the vicinity of one or more potential threats, and/or the at least one mobile device does not comprise or have one or more capabilities that are subject to one or more potential threats, e.g. the at least one mobile device may for instance ignore the one or more pieces of threat information.
  • the at least one apparatus performing and/or controlling the method according to the second exemplary aspect of the present invention may only provide (e.g. output and/or send) one or more pieces of threat information (that are obtained by the at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention) which may for instance be filtered prior to the providing.
  • the at least one mobile device may for instance only obtained one or more pieces of threat information which are subject e.g. to a position and/or one or more capabilities of the at least one mobile device.
  • the respective checking of a position of the at least one mobile and/or the respective checking of a capability information may for instance enable to verify that the at least one mobile device could be subject to the one or more threats, as comprised or represented by the one or more pieces of threat information. Alternatively, such checking may for instance be not be performed and/or controlled.
  • the at least one mobile device may for instance also state information comprising or representing one or more radio capabilities and/or one or more e.g. relatively up-to-date position estimate(s) of its own position (e.g. not older than 10, 20, 30 minutes, or 1 hour, to name but a few non-limiting examples) of the at least one mobile device to the at least one apparatus performing and/or controlling the method according to the second exemplary aspect of the present invention, e.g. prior to obtaining the one or more pieces of threat information.
  • Such information comprising or representing one or more radio capabilities of the at least one mobile device may for instance be stored by the at least one apparatus performing and/or controlling the method according to the second exemplary aspect of the present invention, so that e.g.
  • one or more pieces of threat information may for instance be filtered according to the stated information enabling that the at least one mobile device may for instance only obtain one or more pieces of threat information which are subject e.g. to a position and/or one or more capabilities of the at least one mobile device.
  • the one or more certain capabilities of the at least one mobile device are indicative of one or more capabilities i) to ii):
  • only respective threat information which are considered to be relevant to the respective mobile device and matching a respective radio-type and/or frequency-band which can be utilized by the at least one mobile device may for instance be obtained by the respective device.
  • the at least one mobile device may for instance check whether or not a respective obtained (e.g. received) threat information is related to a respective radio-type and/or frequency-band which can be utilized by the at least one mobile device, e.g.
  • a capability information comprising or represent the actual radio-type and/or frequency-band of the at least one mobile device may for instance be stored locally, e.g. in a memory comprised by or connectable to the at least one mobile device.
  • the positioning is a GNSS- and/or a non-GNSS positioning, wherein the non-GNSS positioning is at least one of:
  • the radio-network based positioning may for instance be one of:
  • the sensor-based positioning may for instance be one of:
  • the data set further comprises a position information indicative of a position of the at least one radio node enabling positioning that is considered to be potentially unexpected, or wherein the position information is determined based on the identification information of at least one radio node enabling positioning that is considered to be potentially manipulated.
  • a radio map may be determined by a positioning server (e.g. the at least one apparatus performing and/or controlling the method according to the second exemplary aspect of the present invention) during the training stage of a non-GNSS based radio positioning system.
  • Causing of determining (e.g. estimating) of a position of a mobile device (e.g. the at least one mobile device) at least partially based on the radio signal parameter(s) may be understood to mean that the radio signal parameter(s) are provided (e.g. transmitted) by a respective mobile device to a server (e.g. a positioning server performing and/or controlling the method according to the first exemplary aspect of the present invention) to cause the server to determine a position of the mobile device at least partially based e.g. on the radio signal parameter(s).
  • the determining of one or more affected radio nodes, and/or of one or more areas within which e.g. one or more affected radio nodes (e.g. the at least one radio node) are located, or alternatively, within which none affected radio node is located, and/or of a respective position estimate may for instance be determined by a processor of the at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention. For instance, such a radio map may be utilized to determine a position of the at least one affected radio, as disclosed above.
  • the apparatus performing and/or controlling performing and/or controlling the method according to the second exemplary aspect of the present invention may for instance determine a position estimate indicative of the position at which a radio measurement (e.g. measured radio signal parameter(s)) was gathered by the at least one mobile device. Then, at least one affected radio node and/or an area may for instance be determined in which the at least one mobile device is located, to provide one or more pieces of threat information which are relevant to the position of the at least one mobile device.
  • a radio measurement e.g. measured radio signal parameter(s)
  • the method further comprises:
  • the second data set may for instance be gathered, e.g. by measuring the second data set by the at least one mobile device.
  • a server or a server cloud e.g. the at least one apparatus performing and/or controlling the method according to the second exemplary aspect of the present invention
  • This may for instance be performed and/or controlled in case a database (e.g. a database that should comprise one or more pieces of threat information formed out of the respective data set(s)) does not preexist.
  • a server or a server cloud may for instance update such a database so that such a database may for instance be up-to-date with the latest information (e.g. the gathered second data set).
  • the second data set may for instance comprise or have the same features as described with respect to the data set of the one or more pieces of threat information as used by a method according to the first exemplary aspect of the present invention.
  • the one or more pieces of data sets may for instance be obtained, by the at least one apparatus performing and/or controlling the method according to the second exemplary aspect of the present invention, e.g. by receiving the one or more pieces of data sets from one or more mobile devices.
  • the one or more mobile devices may for instance be configured to perform and/or control the method according to the first exemplary aspect of the present invention.
  • a respective data set of the one or more pieces of data sets may for instance be gathered by a respective mobile device of the one or more mobile devices, as a second data set, as disclosed above. Then, the gathered second data set may for instance be output (e.g. send) by a respective mobile device to the at least one apparatus, which may for instance obtained this data set as a respective data set of the obtained one or more pieces of data sets.
  • a respective data set of the one or more pieces of data sets may for instance be the a respective second data set gathered based on radio signals of one or more radio nodes enabling positioning gathered by at least one mobile device (e.g. the at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention), and which second data set is output (e.g. send) by the at least one mobile device so that it can be obtained as a respective data set by the at least one apparatus performing and/or controlling the method according to the second exemplary aspect of the present invention.
  • at least one mobile device e.g. the at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention
  • second data set is output (e.g. send) by the at least one mobile device so that it can be obtained as a respective data set by the at least one apparatus performing and/or controlling the method according to the second exemplary aspect of the present invention.
  • Such one or more pieces of data sets may for instance be stored in a database.
  • a respective data set of the database comprises or associated with a certain mobile device, e.g. an identifier of a respective mobile device.
  • a respective data set of the database may for instance comprise or be associated with one or more capabilities of a respective mobile device, e.g. one or more capabilities as disclosed above.
  • a respective data set may for instance be formed into a respective threat information, e.g. dependent upon an identifier of a respective mobile device, and/or dependent upon one or more capabilities.
  • a respective threat information may for instance be provided e.g. to a certain mobile device at least partially based on a respective identifier of the mobile device.
  • a respective threat information may for instance be provided to a respective mobile device, or to a plurality (e.g. at least two) of respective mobile devices at least partially based on one or more capabilities. For instance, only a respective mobile device of the plurality of mobile device may for instance be provided with a respective threat information, wherein the respective threat information is not relevant to this plurality of mobile device.
  • a respective threat information is indicative of a threat for a certain radio-type, and/or a certain frequency-band
  • only (s) respective mobile device(s) which have at least one of the one or more capabilities may for instance be provided with the respective threat information.
  • the amount of information respectively data to be transmitted between the at least one apparatus performing and/or controlling the method according to the second exemplary aspect of the present invention and at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention may for instance be kept low.
  • a respective threat information may for instance be provided (e.g. transferred) to one or more location-based services so that such (a) location-based service(s) may for instance utilize one or more pieces of threat information.
  • such (a) location-based service may for instance themselves provide a respective threat information to one or more respective device(s).
  • Forming the obtained one or more pieces of data sets into one or more pieces of threat information may for instance comprise one or more rawer data sets (e.g. comprising raw measurement data of the respective mobile device which has gathered the data set). Furthermore, forming the obtained one or more pieces of data sets into one or more pieces of threat information may for instance comprise aggregating information respectively data from multiple sources into one or more pieces of threat information. The information respectively data from multiple sources may for instance be other apparatuses which may perform and/or control another method according to the second exemplary aspect of the present invention. In this way, it is enabled to keep and provide one or more pieces of threat information e.g. indicative of spoofing, jamming, and/or meaconing threats up-to-date (e.g. fresh).
  • one or more pieces of threat information e.g. indicative of spoofing, jamming, and/or meaconing threats up-to-date (e.g. fresh).
  • the one or more pieces of threat information may for instance be provided, e.g. by outputting (e.g. sending) at least a part of the one or more pieces of threat information to the one or more mobile devices, and/or to the one or more components responsible for cloud-based positioning in a location-based service, e.g. via a communication interface of the at least one apparatus.
  • a communication interface may for instance comprise one or more radio transceivers (e.g. transmitter and receiver), e.g. according to WLAN-, BT-, BLE-, cellular-communication standard, or a combination thereof, to name but a few non-limiting examples.
  • the forming of one or more pieces of threat information may for instance comprise arranging them to a geospatial index. For instance, arranging one or more pieces of threat information, and/or other information and/or data of multiple (e.g. external) sources into the one or more pieces of threat information may for instance be performed and/or controlled straightforward, e.g. directly as the respective information and/or data (e.g. the one or more pieces of data sets) comes in.
  • the information respectively data contents, in particular comprised by or represented by the one or more pieces of data sets may be one or more of the following:
  • At least a part of the one or more pieces of formed threat information may for instance be provided by outputting the part of the one or more pieces of formed threat information, e.g. to another entity that is different from a respective mobile device of the mobile devices, and/or which is different from the one or more components responsible for a cloud-based positioning in a location-based service, and which transmits (e.g. relays) the output part of the of the one or more pieces of formed threat information to the respective mobile device and/or respective component
  • At least a part one or more pieces of formed threat information is output (e.g. send, in particular via a push method and/or output via an API) to one or more mobile devices that perform and/or control positioning at least partially based on the output part one or more pieces of formed threat information, or a part of it
  • a position of one or more mobile devices may for instance be determined, e.g. in order to determine to which respective mobile device one or more pieces of threat information may for instance be provided.
  • a positioning request may for instance be sent to a positioning server by the at least one apparatus.
  • Such a positioning request may for instance comprise or represent an identifier of the respective mobile device whose position is requested to be determined.
  • the request may for instance not be output by the mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention, but by the at least one apparatus, and/or even by a third party.
  • a position estimate indicative of an estimated position of the respective mobile device may for instance be received.
  • a position estimate may for instance be in the form of coordinates, e.g. x-, y-coordinates, and/or latitude-, longitude-coordinates.
  • a position estimate may for instance comprise or represent a three-dimensional position, e.g. in the form of three-dimensional coordinates (e.g. x-, y-, z-coordinates, and/or latitude-, longitude-, altitude-coordinates).
  • a positioning server may for instance utilize a radio map, as disclosed above.
  • only a part (e.g. of a full (e.g. global) database comprising one or more pieces of threat information) of the one or more pieces of threat information is provided dependent upon a position, and/or upon one or more capabilities of a respective mobile device to which the part of the one or more pieces of threat information is provided.
  • a respective mobile device may for instance not require a full (e.g. global) database, respectively all of the available pieces of threat information.
  • a respective mobile device may for instance retrieve (e.g. request) the respective pieces of threat information, e.g. via an API, where the respective pieces of threat information may for instance be requested e.g. from the server or a server cloud performing and/or controlling the method according to the second exemplary aspect of the present invention
  • the respective mobile device may for instance provide e.g. an indication of its position (e.g. a position estimate) prior to the requesting or together with the request In this way, e.g.
  • the server or server cloud performing and/or controlling the method according to the second exemplary aspect of the present invention may for instance return relevant pieces of threat information for the surroundings of the respective mobile device (e.g. an area - e.g. a subset of the database - in which the respective mobile device is located, only). Further, this enables to keep the size of the data to be transferred to the respective mobile device, e.g. from the server or the server cloud low.
  • the respective mobile device(s) may for instance also state information comprising or representing one or more capabilities (e.g. radio-band or frequency-band) of the respective mobile device, so that e.g. subsets of the pieces of threat information may for instance only be provided to the respective mobile device(s) for the relevant radios and/or frequency-bands.
  • a respective data set of the one or more pieces of data sets is associated with a timestamp information indicative of a time and/or date at which the respective data set was gathered prior to the obtaining of said respective data set (by the at least one apparatus performing and/or controlling the method according to the second exemplary aspect of the present invention).
  • the timestamp information may for instance be indicative of a current time and/or date when it is associated with a respective data set
  • the timestamp information may for instance be used to reject out-dated information (e.g. obtained one or more pieces of data sets, to name but one non-limiting example).
  • the timestamp information may for instance be used to determine whether or not e.g. one or more pieces of threat information (e.g. formed out of the obtained one or more pieces of data sets, thus, they may for instance comprise or be associated with the timestamp information) are considered to be unreliable. For instance, the older e.g. a respective threat information is, the more unreliable its represented information can be considered to be.
  • a recipient e.g. at least one mobile device performing and/or controlling the method according to the first exemplary aspect of the present invention may for instance be enabled to obtain (e.g. receive) only (a) respective threat information formed at least partially based on the respective data set(s) which may for instance be relevant for the respective at least one mobile device.
  • a timestamp information may for instance be used as a "filter" criterion, and then, considering one or more capabilities of the respective at least one mobile device, e.g. one or more capabilities as disclosed above with respect to the method according to the first exemplary aspect of the present invention, may for instance be further used to filter which may for instance be relevant for the respective at least one mobile device.
  • the method (according to the first exemplary aspect of the present invention) and/or the method (according to the second exemplary aspect of the present invention) is performed and/or controlled in real-time.
  • real-time is considered to comprise that the steps of the gathering, outputting and obtaining are performed and/or controlled so that the processing to have one or more result(s) available is finished within a specified period of time.
  • near real-time refers to a specified period of time that is in particular longer than the specified period of time defined by the term real-time.
  • near real-time may additionally refer to that the processing to have one or more result(s) available of the steps of the gathering, outputting and obtaining are dependent to be finished upon pre-determined time intervals, at which the results may be available, e.g. every 10, 20, 30, or more seconds, to name but a few non-limiting examples.
  • Fig. 1 is a schematic high-level block diagram of a system 1 according to an exemplary aspect of the present invention.
  • system 1 is a non-GNSS based radio positioning system for a predetermined environment like a venue (e.g. building or a complex of buildings, such as a shopping center, a parking garage, an airport, a company site, etc.).
  • a venue e.g. building or a complex of buildings, such as a shopping center, a parking garage, an airport, a company site, etc.
  • each of mobile devices 2-1 to 2-3 may be one of a smartphone, a tablet computer, a notebook computer, a smart watch, a smart band, and an IoT device.
  • Mobile devices 2-1 to 2-3 may be enabled for or support non-GNSS based radio positioning system 1.
  • System 1 comprises an affected (e.g. spoofed) radio node 5, which may for instance be installed by a fraudulent third party in the venue.
  • this radio node 5 may for instance employ a manipulation technique like spoofing, jamming and/or meaconing in the venue so that position estimates determined in the venue under consideration of radio signals and/or radio signal parameters of this radio node 5 comprise or represent a false position.
  • System 1 comprises a positioning server 3 and a plurality of optional radio nodes 4-1 to 4-5.
  • System 1 is not limited to a single positioning server 3, but may optionally comprise a plurality of servers (e.g. forming a server cloud). Accordingly, positioning server 3 may be part of such a plurality of servers (e.g. a server cloud) or may be represented by such a plurality of servers (e.g. a server cloud).
  • radio nodes 4-1 to 4-5 are dedicated position support radio nodes in the form of BLE beacons 4-1 to 4-5 fixedly installed in the predetermined environment of system 1.
  • system 1 may comprise further radio nodes or BLE beacons.
  • each of BLE beacons 4-1 to 4-5 may be configured to automatically and repeatedly transmit a respective BLE radio signal like an advertisement signal.
  • the BLE radio signals transmitted by radio nodes 4-1 to 4-5 may contain and/or represent positioning support information which are configured to enable mobile devices 2-1 to 2-3 to estimate their position at least partially based on these positioning support information.
  • An example of such positioning support information is an identifier like an UUID of the respective one of radio nodes 4-1 to 4-5 transmitting the respective radio signal containing this positioning support information.
  • mobile devices like mobile devices 2-1 to 2-3 may collect radio fingerprint observation reports indicating an observation position within the predetermined environment and the UUIDs contained in or represented by the BLE radio signals transmitted by BLE beacons 4-1 to 4-5 observable at the observation position.
  • the collected radio fingerprint observation reports may be provided (e.g. transmitted) by the mobile devices to positioning server 3 for determining a radio map.
  • the radio map maybe configured to enable mobile devices 2-1 to 2-3 to determine (e.g. estimate) their position at least partially based on this radio map when the mobile devices are located within the predetermined environment of system 1 (i.e. the area covered by the radio map).
  • the radio map is represented by radio map information which may be provided (e.g. transmitted) by a positioning server 3 to mobile devices 2-1 to 2-3 and/or which may be hold available by mobile device 2-1 to 2-3 (e.g. stored in a memory of mobile devices 2-1 to 2-3).
  • the radio map contains or represents a respective radio model for each of BLE beacons 4-1 to 4-5.
  • the radio map may represent the respective installation position of each of BLE beacons 4-1 to 4-5.
  • a respective radio model for a respective BLE beacon of BLE beacons 4-1 to 4-5 may be understood to represent at least the expected radio coverage of the respective radio node.
  • the radio model of such a BLE beacon may at least describe the coverage area within which radio signals transmitted by this radio node are expected to be observable.
  • mobile devices 2-1 to 2-3 may use the radio map to determine (e.g. estimate) their position at least partially based on radio signal parameters of observable radio signals. For example, if mobile device 2-1 obtains radio signal parameters (e.g. UUIDs, received signal strength value/indicator, etc.) of three BLE radio signals transmitted by BLE beacons 4-1, 4-2 an 4-3 when scanning for observable radio signals at its present position, it may for example determine (e.g. estimate) by use of the radio map that its presents position is within the overlapping region of the coverage areas described by the radio models of BLE beacons 4-1, 4-2 an 4-3.
  • radio signal parameters e.g. UUIDs, received signal strength value/indicator, etc.
  • non GNSS-based radio positioning systems like system 1 and/or a GNSS-based positioning system, may be affected by manipulating radio signals that are used for positioning purposes during the positioning stage.
  • Manipulation techniques may for example be spoofing or jamming of such radio signals as described above in more detail.
  • an attacker may install the affected (e.g. spoofed) radio node 5 in a certain area to deceive mobile devices 2-1 to 2-3 to cause them to determine to be located within the overlapping region of the coverage areas described by the radio models of BLE beacons 4-1, 4-2 an 4-3.
  • the spoofing radio node 5 may be configured to (e.g.
  • mobile devices 2-1 to 2-3 determine (e.g. estimate) their position at least partially based on radio signal parameters of these spoofed BLE radio signals, they may determine (e.g. estimate) their position to be within the overlapping region of the coverage areas described by the radio models of BLE beacons 4-1, 4-2 an 4-3 even though they may be located in an entirely different area.
  • Example embodiments according to all aspects of the present invention enable e.g. a real-time spoofing, jamming, and/or meaconing warning service for network and/or GNSS-based positioning, wherein
  • Fig. 2 is a flowchart 200 showing an example embodiment of a method according to the second exemplary aspect of the present invention.
  • This flowchart 200 may for instance be performed by a server or a server cloud, e.g. server 3 of Fig. 1 .
  • a first step 201 one or more pieces of data sets are obtained.
  • the one or more pieces of data sets may for instance be obtained by receiving the one or more pieces of data sets, e.g. from one or more mobile devices (e.g. mobile device 2-1 to 2-3 of Fig. 1 ).
  • one or more pieces of data sets may for instance be obtained from other sources, e.g. other positioning servers (not shown in Fig. 1 ), or other electronic devices, such as IoT-devices, portable navigation devices, smartwatches, to name but a few non-limiting examples.
  • the one or more pieces of data sets may for instance be received directly e.g. from the mobile devices, or alternatively, from entities that are different e.g. from the mobile devices, and which relay the one or more pieces of data sets to the server.
  • a second step 202 said one or more pieces of data sets are formed into one or more pieces of threat information.
  • the forming of the one or more pieces of threat information may for instance be performed by at least one processor (e.g. processor 410 of apparatus 400 of Fig. 4 ).
  • the one or more pieces of threat information are provided, e.g. to one or more mobile devices (e.g. mobile devices 2-1 to 2-3 of Fig. 1 ) by using an application programming interface, and/or by using a push method.
  • the one or more pieces of threat information, or a part of it may for instance be provided to at least one of a plurality of mobile devices (e.g. at least one of the mobile device 2-1 to 2-3 of Fig. 1 ), and/or to a location-based service.
  • the one or more pieces of threat information may for instance be provided, e.g. by sending the one or more pieces of threat information, e.g. via communication interface (e.g. communication interface(s) 450 of apparatus 400 of Fig. 4 ).
  • Fig. 3a is a flowchart 300a showing an example embodiment of a method according to the first exemplary aspect of the present invention.
  • This flowchart 300a may for instance be performed by a mobile device, e.g. a mobile terminal.
  • This flowchart 300a may for instance be performed by at least one of the mobile devices 2-1 to 2-3 of Fig. 1 .
  • a first step 301 one or more pieces of threat information are obtained.
  • the one or more pieces of threat information may for instance be obtained by receiving the one or more pieces of threat information, e.g. from a server or a server cloud (e.g. server 3 of Fig. 1 ) performing flowchart 200 of Fig. 2 .
  • the one or more pieces of threat information may for instance be received directly e.g. from the server or server cloud, or alternatively, from an entity that is different e.g. from the server or server cloud, and which relays the one or more pieces of threat information to the mobile device.
  • the one or more pieces of threat information are obtained by using an application programming interface.
  • the mobile device may for instance (e.g. actively) request the one or more pieces of threat information via such an API.
  • the one or more pieces of threat information are obtained by using a push method.
  • the mobile device may for instance (e.g. directly) be requested to accept that the one or more pieces of threat information are pushed to the mobile device.
  • a position estimate is determined at least partially based on the one or more pieces of threat information.
  • Fig. 3b is a flowchart 300b showing an example embodiment of a method according to the first exemplary aspect of the present invention.
  • This flowchart 300b may for instance be performed by a mobile device, e.g. a mobile terminal.
  • This flowchart 300b may for instance be performed by at least one of the mobile devices 2-1 to 2-3 of Fig. 1 .
  • the flowchart 300b may for instance be performed in addition to the flowchart 300a of Fig. 3a .
  • Any of the further steps 304 to 308 may for instance be performed in parallel or after any of the steps 301 to 303 of flowchart 300a of Fig. 3a .
  • a timestamp information is checked.
  • the mobile device may for example selectively replace records in a locally stored database (e.g. data memory 540 of apparatus 500 of Fig. 5 ) and/or determine whether or not obtained one or more pieces of threat information (see step 301 of Fig. 3a ) are outdated, e.g. by comparing timestamps - newer data replaces old data.
  • a position is checked.
  • the mobile device may for instance determine whether or not obtained one or more pieces of threat information (see step 301 of Fig. 3a ) are related to a position at which the mobile device is located.
  • the position may for instance be checked via a GNSS-based positioning and/or via a non-GNSS-based positioning.
  • the position may for instance be checked based on a GNSS-based positioning.
  • a capability information is checked.
  • the mobile device may for instance determine whether or not obtained one or more pieces of threat information (see step 301 of Fig. 3a ) are related to one or more capabilities of the mobile device.
  • At least one affected radio node is determined.
  • the at least one affected radio node may for instance be determined at least partially based on the one or more pieces of threat information obtained (see step 301 of Fig. 3a ).
  • the at least one affected radio node may for instance be determined by a processor (e.g. processor 510 in case flowchart 300b is performed and/or controlled by apparatus 500 of Fig. 5 ).
  • the at least one affected radio node is blocked from being utilized for the positioning.
  • a frequency-band associated with the at least one affected radio node may for instance be blocked from being utilized in a positioning.
  • a radio type associated with the at least one affected radio node is blocked from being utilized in a positioning.
  • Fig. 3c is a flowchart 300c showing an example embodiment of a method according to the first exemplary aspect of the present invention.
  • This flowchart 300c may for instance be performed by a mobile device, e.g. a mobile terminal.
  • This flowchart 300c may for instance be performed by at least one of the mobile devices 2-1 to 2-3 of Fig. 1 .
  • the flowchart 300c may for instance be performed in addition to the flowchart 300a of Fig. 3a , and optionally in addition to flowchart 300b of Fig. 3b .
  • Any of the further steps 309-1 and 309-2 may for instance be performed in parallel or after any of the steps 301 to 308 of the flowcharts 300a of Fig. 3a and 300b of Fig. 3b .
  • a second data set is gathered.
  • the second data set may for instance be gathered by measuring the second data set, e.g. with sensor(s) 570 in case flowchart 300c is performed and/or controlled by apparatus 500 of Fig. 5 .
  • the second data set is output together with a timestamp information.
  • the mobile device may for instance determine the timestamp information to represent a current date and/or time at which the second data set was gathered (see step 309-1). Then, the second data set may for instance be output together with the timestamp information, e.g. by sending the second data and the timestamp information to a server or a server cloud, e.g. server 3 of Fig. 1 performing and/or controlling the flowchart 200 of Fig. 2 .
  • flowchart 200 of Fig. 2 and flowchart 300a of Fig. 3a , and optionally flowcharts 300b and/or 300c of Fig. 3b and 3c are performed and/or controlled together, e.g. in real-time.
  • Fig. 4 is a schematic block diagram of an apparatus 400 according to an exemplary aspect of the present invention, which may for instance represent the server 3 of Fig. 1 .
  • Apparatus 400 may for instance be configured to perform and/or control the method according to the second exemplary aspect of the present invention.
  • Apparatus 400 comprises a processor 410, working memory 420, program memory 430, data memory 440, communication interface(s) 450, and an optional user interface 460.
  • Apparatus 400 may for instance be configured to perform and/or control or comprise respective means (at least one of 410 to 460] for performing and/or controlling the method according to the second exemplary aspect of the present invention.
  • Apparatus 400 may as well constitute an apparatus comprising at least one processor (410) and at least one memory (420) including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause an apparatus, e.g. apparatus 400 at least to perform and/or control the method according to the second exemplary aspect of the invention of the present invention.
  • Processor 410 may for instance comprise data set obtainer 411 as a functional and/or structural unit
  • Data set obtainer 411 may for instance be configured to obtain one or more pieces of data sets (see step 201 of Fig. 2 ).
  • Processor 410 may for instance comprise threat information former 412 as a functional and/or structural unit.
  • Threat information former 412 may for instance be configured to form one or more pieces of threat information (see step 202 of Fig. 2 ).
  • Processor 410 may for instance further control the memories 420 to 440, the communication interface(s) 450, and the optional user interface 460.
  • Processor 410 may for instance execute computer program code stored in program memory 430, which may for instance represent a computer readable storage medium comprising program code that, when executed by processor 410, causes the processor 410 to perform the method according to the second exemplary aspect of the present invention.
  • Processor 410 may be a processor of any suitable type.
  • Processor 410 may comprise but is not limited to one or more microprocessor(s), one or more processor(s) with accompanying one or more digital signal processor(s), one or more processor(s) without accompanying digital signal processor(s), one or more special-purpose computer chips, one or more field-programmable gate array(s) (FPGA(s)), one or more controller(s), one or more application-specific integrated circuit(s) (ASIC(s)), or one or more computer(s).
  • FPGA field-programmable gate array
  • ASIC application-specific integrated circuit
  • Processor 410 may for instance be an application processor that runs an operating system.
  • Program memory 430 may also be included into processor 410. This memory may for instance be fixedly connected to processor 410, or be at least partially removable from processor 410, for instance in the form of a memory card or stick. Program memory 430 may for instance be non-volatile memory. It may for instance be a FLASH memory (or a part thereof), any of a ROM, PROM, EPROM and EEPROM memory (or a part thereof) or a hard disc (or a part thereof), to name but a few examples. Program memory 430 may also comprise an operating system for processor 410. Program memory 430 may also comprise a firmware for apparatus 400.
  • Apparatus 400 comprises a working memory 420, for instance in the form of a volatile memory. It may for instance be a Random Access Memory (RAM) or Dynamic RAM (DRAM), to give but a few non-limiting examples. It may for instance be used by processor 410 when executing an operating system and/or computer program.
  • RAM Random Access Memory
  • DRAM Dynamic RAM
  • Data memory 440 may for instance be a non-volatile memory. It may for instance be a FLASH memory (or a part thereof), any of a ROM, PROM, EPROM and EEPROM memory (or a part thereof) or a hard disc (or a part thereof), to name but a few examples. Data memory 440 may for instance store one or more pieces of data sets, one or more pieces of threat information, or a combination thereof, to name but a few non-limiting examples.
  • Communication interface(s) 450 enable apparatus 400 to communicate with other entities, e.g. with at least one of the mobile devices 2-1 to 2-3, and/or with at least one of the radio nodes 4-1 to 4-5, 5 of Fig. 1 .
  • the communication interface(s) 450 may for instance comprise a wireless interface, e.g. a cellular radio communication interface and/or a WLAN interface) and/or wire-bound interface, e.g. an IP-based interface, for instance to communicate with entities via the Internet
  • User interface 460 is optional and may comprise a display for displaying information to a user and/or an input device (e.g. a keyboard, keypad, touchpad, mouse, etc.) for receiving information from a user.
  • an input device e.g. a keyboard, keypad, touchpad, mouse, etc.
  • Some or all of the components of the apparatus 400 may for instance be connected via a bus. Some or all of the components of the apparatus 400 may for instance be combined into one or more modules.
  • Fig. 5 is a schematic block diagram of an apparatus 500 according to an exemplary aspect of the present invention, which may for instance represent at least one of the mobile devices 2-1 to 2-3 of Fig. 1 .
  • Apparatus 500 may for instance be configured to perform and/or control the method according to the first exemplary aspect of the present invention.
  • Apparatus 500 comprises a processor 510, working memory 520, program memory 530, data memory 540, communication interface(s) 550, and an optional user interface 560 and an optional sensor(s) 570.
  • Apparatus 500 may for instance be configured to perform and/or control or comprise respective means (at least one of 510 to 570) for performing and/or controlling the method according to the first exemplary aspect of the present invention.
  • Apparatus 500 may as well constitute an apparatus comprising at least one processor (510) and at least one memory (520) including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause an apparatus, e.g. apparatus 500 at least to perform and/or control the method according to the first exemplary aspect of the invention of the present invention.
  • Processor 510 may for instance comprise a threat information obtainer 511 as a functional and/or structural unit
  • Threat information obtainer 511 may for instance be configured to obtain one or more pieces of threat information (see step 301 of Fig. 3a ).
  • Processor 510 may for instance comprise a threat information utilizer 512 as a functional and/or structural unit Threat information utilizer 512 may for instance be configured to utilize one or more pieces of threat information in a positioning (see step 303 of Fig. 3a ).
  • Threat information utilizer 512 may for instance be further configured to check a timestamp information (see step 304 of Fig. 3b ), check a position (see step 305 of Fig. 3b ), check a capability information (see step 306 of Fig. 3b ), determine at least one affected radio node (see step 307 of Fig. 3b ), block at least one affected radio node from being utilized in a positioning (see step 308 of Fig. 3b ), or a combination thereof, to name but a few non-limiting examples.
  • Processor 510 may for instance comprise an optional data set gatherer 513 as a functional and/or structural unit.
  • Data set gatherer 513 may for instance be configured to gather at least one data set (e.g. a second data set) (see step 309-1 of Fig. 3c ).
  • Processor 510 may for instance further control the memories 520 to 540, the communication interface(s) 550, the optional user interface 560 and the optional sensor(s) 570.
  • Processor 510 may for instance execute computer program code stored in program memory 530, which may for instance represent a computer readable storage medium comprising program code that, when executed by processor 510, causes the processor 510 to perform the method according to the first exemplary aspect of the present invention.
  • Processor 510 may be a processor of any suitable type.
  • Processor 510 may comprise but is not limited to one or more microprocessor(s), one or more processor(s) with accompanying one or more digital signal processor(s), one or more processor(s) without accompanying digital signal processor(s), one or more special-purpose computer chips, one or more field-programmable gate array(s) (FPGA(s)), one or more controller(s), one or more application-specific integrated circuit(s) (ASIC(s)), or one or more computer(s).
  • FPGA field-programmable gate array
  • ASIC application-specific integrated circuit
  • Processor 510 may for instance be an application processor that runs an operating system.
  • Program memory 530 may also be included into processor 510. This memory may for instance be fixedly connected to processor 510, or be at least partially removable from processor 510, for instance in the form of a memory card or stick
  • Program memory 530 may for instance be non-volatile memory. It may for instance be a FLASH memory (or a part thereof), any of a ROM, PROM, EPROM and EEPROM memory (or a part thereof) or a hard disc (or a part thereof), to name but a few examples.
  • Program memory 530 may also comprise an operating system for processor 510.
  • Program memory 530 may also comprise a firmware for apparatus 500.
  • Apparatus 500 comprises a working memory 520, for instance in the form of a volatile memory. It may for instance be a Random Access Memory (RAM) or Dynamic RAM (DRAM), to give but a few non-limiting examples. It may for instance be used by processor 510 when executing an operating system and/or computer program.
  • RAM Random Access Memory
  • DRAM Dynamic RAM
  • Data memory 540 may for instance be a non-volatile memory. It may for instance be a FLASH memory (or a part thereof), any of a ROM, PROM, EPROM and EEPROM memory (or a part thereof) or a hard disc (or a part thereof), to name but a few examples. Data memory 540 may for instance store one or more pieces of threat information, one or more pieces of timestamp information, one or more positions, one or more position estimates, one or more affected radio node (e.g. one or more identifiers of such one or more affected radio node), one or more data sets, or a combination thereof, to name but a few non-limiting examples.
  • affected radio node e.g. one or more identifiers of such one or more affected radio node
  • Communication interface(s) 550 enable apparatus 500 to communicate with other entities, e.g. with server 3 of Fig. 1 .
  • the communication interface(s) 550 may for instance comprise a wireless interface, e.g. a cellular radio communication interface and/or a WLAN interface) and/or wire-bound interface, e.g. an IP-based interface, for instance to communicate with entities via the Internet.
  • Communication interface(s) may enable apparatus 500 to communicate with other entities, for instance with radio nodes 4-1 to 4-5, and/or 5 of Fig. 1 .
  • User interface 560 is optional and may comprise a display for displaying information to a user and/or an input device (e.g. a keyboard, keypad, touchpad, mouse, etc.) for receiving information from a user.
  • an input device e.g. a keyboard, keypad, touchpad, mouse, etc.
  • Sensor(s) 570 are optional and may for instance comprise a barometric sensor, e.g. to gather pressure information.
  • Some or all of the components of the apparatus 500 may for instance be connected via a bus. Some or all of the components of the apparatus 500 may for instance be combined into one or more modules.
  • Fig. 6 is a schematic illustration of examples of tangible and non-transitory computer-readable storage media according to the present invention that may for instance be used to implement one or more of the memories 420, 430 of Fig. 4 and/or memories 520, 530 of Fig. 5 .
  • Fig. 6 displays a flash memory 600, which may for instance be soldered or bonded to a printed circuit board, a solid-state drive 601 comprising a plurality of memory chips (e.g. Flash memory chips), a magnetic hard drive 602, a Secure Digital (SD) card 603, a Universal Serial Bus (USB) memory stick 604, an optical storage medium 605 (such as for instance a CD-ROM or DVD) and a magnetic storage medium 606.
  • SD Secure Digital
  • USB Universal Serial Bus
  • connection in the described embodiments is to be understood in a way that the involved components are operationally coupled.
  • connections can be direct or indirect with any number or combination of intervening elements, and there may be merely a functional relationship between the components.
  • circuitry refers to any of the following:
  • circuitry' also covers an implementation of merely a processor (or multiple processors) or section of a processor and its (or their) accompanying software and/or firmware.
  • the term 'circuitry' also covers, for example, a baseband integrated circuit or applications processor integrated circuit for a mobile phone.
  • Any processor may comprise but is not limited to one or more microprocessors, one or more processor(s) with accompanying digital signal processor(s), one or more processor(s) without accompanying digital signal processor(s), one or more special-purpose computer chips, one or more field-programmable gate arrays (FPGAS), one or more controllers, one or more application-specific integrated circuits (ASICS), or one or more computer(s).
  • FPGAS field-programmable gate arrays
  • ASICS application-specific integrated circuits
  • the relevant structure/hardware has been programmed in such a way to carry out the described function.
  • a client-side implementation that uses the real-time information to take appropriate actions may for instance be required to be performed and/or controlled as well.
  • RTI real-time integrity
  • a mechanism of keeping a database e.g. locally at the device(s), and/or at a positioning server, to name but a few non-limiting examples
  • a mechanism of keeping a database may for instance be considered to be an optimal approach.
  • some threats are sporadic, short term and almost random in nature. In such a case, alerts must be pushed in real-time to the needing devices.
  • any presented connection in the described embodiments is to be understood in a way that the involved components are operationally coupled.
  • the connections can be direct or indirect with any number or combination of intervening elements, and there may be merely a functional relationship between the components.
  • any of the methods, processes and actions described or illustrated herein may be implemented using executable instructions in a general-purpose or special-purpose processor and stored on a computer-readable storage medium (e.g., disk, memory, or the like) to be executed by such a processor.
  • a computer-readable storage medium e.g., disk, memory, or the like
  • References to a 'computer-readable storage medium' should be understood to encompass specialized circuits such as FPGAs, ASICs, signal processing devices, and other devices.
  • a and/or B is considered to comprise any one of the following three scenarios: (i) A, (ii) B, (iii) A and B.
  • article “a” is not to be understood as “one”, i.e. use of the expression “an element” does not preclude that also further elements are present
  • the term “comprising” is to be understood in an open sense, i.e. in a way that an object that "comprises an element A” may also comprise further elements in addition to element A.
  • the statement of a feature comprises at least one of the subsequently enumerated features is not mandatory in the way that the feature comprises all subsequently enumerated features, or at least one feature of the plurality of the subsequently enumerated features. Also, a selection of the enumerated features in any combination or a selection of only one of the enumerated features is possible. The specific combination of all subsequently enumerated features may as well be considered. Also, a plurality of only one of the enumerated features may be possible.
EP18214724.9A 2018-12-20 2018-12-20 Service d'avertissement en temps réel de mystification/brouillage/transplexion Pending EP3671254A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP18214724.9A EP3671254A1 (fr) 2018-12-20 2018-12-20 Service d'avertissement en temps réel de mystification/brouillage/transplexion
US16/723,451 US11480652B2 (en) 2018-12-20 2019-12-20 Service for real-time spoofing/jamming/meaconing warning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP18214724.9A EP3671254A1 (fr) 2018-12-20 2018-12-20 Service d'avertissement en temps réel de mystification/brouillage/transplexion

Publications (1)

Publication Number Publication Date
EP3671254A1 true EP3671254A1 (fr) 2020-06-24

Family

ID=64755217

Family Applications (1)

Application Number Title Priority Date Filing Date
EP18214724.9A Pending EP3671254A1 (fr) 2018-12-20 2018-12-20 Service d'avertissement en temps réel de mystification/brouillage/transplexion

Country Status (2)

Country Link
US (1) US11480652B2 (fr)
EP (1) EP3671254A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112650088A (zh) * 2020-09-03 2021-04-13 南京煜耀智能科技有限公司 一种基于SaaS平台智能水电控制系统
EP3902341A1 (fr) * 2020-04-22 2021-10-27 HERE Global B.V. Génération de carte radio pour déplacer des sites

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3672185A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Identification de signaux radio et/ou de paramètres de signal radio potentiellement manipulés
EP3671253A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Crowd-sourcing de signaux radio potentiellement manipulés et/ou de paramètres de signal radio
EP3672304A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Analyse statistique de fausses correspondances pour détection de mystification
EP3672311A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Apprentissage d'un positionnement manipulé centré sur un dispositif
EP3672310A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Identification de signaux radio et/ou de paramètres de signal radio potentiellement manipulés sur la base d'informations de carte radio
EP3671252A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Identification de signaux radio et/ou de paramètres de signal radio potentiellement manipulés sur la base de premières informations de carte radio et de secondes informations de carte radio
EP3672305B1 (fr) 2018-12-20 2023-10-25 HERE Global B.V. Activation de fourniture flexible de données de signature de données de position représentant une position estimée
US11082937B2 (en) * 2019-10-24 2021-08-03 Charter Communications Operating, Llc Methods and apparatus for distributing time, frequency, and/or phase information using NB-IoT

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060240840A1 (en) * 2005-02-22 2006-10-26 Skyhook Wireless, Inc. Continuous data optimization by filtering and positioning systems
US20130310068A1 (en) * 2012-05-21 2013-11-21 Qualcomm Incorporated Radio frequency interference awareness assistance data
US20180219869A1 (en) * 2014-06-13 2018-08-02 Philips Lighting Holding B.V. Localization based on network of wireless nodes

Family Cites Families (110)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6049333A (en) * 1996-09-03 2000-04-11 Time Warner Entertainment Company, L.P. System and method for providing an event database in a telecasting system
US6448925B1 (en) 1999-02-04 2002-09-10 Conexant Systems, Inc. Jamming detection and blanking for GPS receivers
US6501956B1 (en) * 2000-10-17 2002-12-31 Intervoice Limited Partnership Providing blended interface for wireless information services
AUPR863401A0 (en) 2001-11-02 2001-11-29 Qx Corporation Pty Ltd A method & device for precision time-lock
US7788382B1 (en) * 2002-03-26 2010-08-31 Good Technology, Inc. Server initiated synchronization
JP3919654B2 (ja) 2002-11-29 2007-05-30 株式会社東芝 携帯端末
US7493652B2 (en) 2003-08-06 2009-02-17 Microsoft Corporation Verifying location of a mobile node
US7312752B2 (en) 2003-10-22 2007-12-25 Awarepoint Corporation Wireless position location and tracking system
GB0407335D0 (en) 2004-03-31 2004-05-05 British Telecomm Authorisation
US7738884B2 (en) 2005-06-28 2010-06-15 Microsoft Corporation Positioning service utilizing existing radio base stations
US20070049323A1 (en) 2005-08-25 2007-03-01 Research In Motion Limited Rogue access point detection and restriction
US7716740B2 (en) 2005-10-05 2010-05-11 Alcatel Lucent Rogue access point detection in wireless networks
US7574202B1 (en) 2006-07-21 2009-08-11 Airsurf Wireless Inc. System and methods for a secure and segregated computer network
US8554176B2 (en) 2007-09-18 2013-10-08 Qualcomm Incorporated Method and apparatus for creating a remotely activated secure backup service for mobile handsets
US20090088132A1 (en) 2007-09-28 2009-04-02 Politowicz Timothy J Detecting unauthorized wireless access points
US7970894B1 (en) 2007-11-15 2011-06-28 Airtight Networks, Inc. Method and system for monitoring of wireless devices in local area computer networks
US8750267B2 (en) 2009-01-05 2014-06-10 Qualcomm Incorporated Detection of falsified wireless access points
US8340692B2 (en) 2009-07-09 2012-12-25 Telefonaktiebolaget L M Ericsson (Publ) Positioning with several operators
US8423043B2 (en) 2009-09-14 2013-04-16 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for location fingerprinting
US20110131651A1 (en) 2009-12-01 2011-06-02 Senthilraj Shanmugavadivel Method and device for detecting a spoofing attack in a wireless communication network
US20110154050A1 (en) 2009-12-22 2011-06-23 Pitney Bowes Inc. System and method for selectively providing cryptographic capabilities based on location
WO2012014008A1 (fr) 2010-07-30 2012-02-02 Abb Research Ltd Procédé et système de localisation dans un réseau industriel de capteurs sans fil
US8514131B2 (en) 2010-09-03 2013-08-20 Qualcomm Incorporated Methods and apparatus for increasing the reliability of signal reference maps for use in position determination
US9026144B2 (en) 2011-01-26 2015-05-05 Mobio Oy Location tagging
US8655312B2 (en) 2011-08-12 2014-02-18 F-Secure Corporation Wireless access point detection
US9466881B1 (en) 2011-11-16 2016-10-11 Exelis, Inc. Detection of wireless data jamming and spoofing
CN103228040A (zh) 2012-01-31 2013-07-31 国际商业机器公司 室内电子地图生成方法与系统及室内目标定位方法与系统
WO2013136121A1 (fr) 2012-03-15 2013-09-19 Nokia Corporation Prise en charge d'opérations basées sur la position
US9369845B2 (en) 2012-03-23 2016-06-14 Skyhook Wireless, Inc. Methods and systems of assigning estimated positions and attributes to wireless access points in a positioning system
US8805403B2 (en) 2012-04-05 2014-08-12 Qualcomm Incorporated Automatic data accuracy maintenance in a Wi-Fi access point location database
US8977292B2 (en) 2012-04-05 2015-03-10 Telefonaktiebolaget L M Ericsson (Publ) Positioning accuracy estimation
KR102041449B1 (ko) 2012-05-11 2019-11-27 삼성전자주식회사 사용자의 위치를 획득하는 방법 및 장치
US9113291B2 (en) 2012-06-18 2015-08-18 Qualcomm Incorporated Location detection within identifiable pre-defined geographic areas
JP2015531053A (ja) 2012-06-26 2015-10-29 ザ ガヴァーニング カウンシル オブ ザ ユニヴァーシティ オブ トロント 無線マップを動的に作成するためのシステム、方法、及びコンピュータプログラム
US8571578B1 (en) 2012-07-26 2013-10-29 Google Inc. Identifying mobile access points
KR20140057905A (ko) 2012-11-05 2014-05-14 한국전자통신연구원 소프트 로그 액세스 포인트를 구동하는 공격 단말 색출 방법 및 이 방법을 수행하는 장치
KR101953547B1 (ko) 2012-11-26 2019-03-04 한국전자통신연구원 보안 이벤트를 이용한 모바일 단말의 관리 제어 방법 및 그 장치
EP2746813B1 (fr) 2012-12-21 2017-08-23 Astrium GmbH Détection de mystification des signaux de navigation GNSS
US10530486B2 (en) * 2012-12-27 2020-01-07 Panasonic Intellectual Property Corporation Of America Transmitting method, transmitting apparatus, and program
US20150351017A1 (en) 2013-01-11 2015-12-03 Nokia Technologies Oy Verifying stored location data for WLAN access points
US9374709B2 (en) 2013-01-29 2016-06-21 General Motors Llc Methods and systems for base station detection
WO2014135921A1 (fr) 2013-03-06 2014-09-12 Here Global B.V. Sélection d'ensembles de données de carte radiofréquence basée sur des informations de terminal mobile
US9635433B2 (en) 2013-03-08 2017-04-25 Google Inc. Proximity detection by mobile devices
US9842495B2 (en) 2013-03-15 2017-12-12 Acyclica Inc. Traffic analysis system using wireless networking devices
EP2979108B1 (fr) 2013-03-26 2018-07-25 Nokia Technologies OY Utilisation de dérivés raccourcis d'identificateurs d'entités de systèmes de communication à des fins de récupération d'informations de positionnement
US9467804B2 (en) 2013-05-20 2016-10-11 Location Sentry Corp. Emission control for wireless location management
GB2516284A (en) 2013-07-18 2015-01-21 Here Global Bv Method and apparatus for classifying access points in a radio map
EP3022975A4 (fr) 2013-07-19 2017-03-22 Intel Corporation Identification de points d'accès malveillants
GB2516832A (en) 2013-07-31 2015-02-11 Here Global Bv Method and apparatus for determining quality of radio maps
US9282435B2 (en) 2013-08-31 2016-03-08 Location Sentry Corp Location spoofing detection
KR102000159B1 (ko) 2013-12-18 2019-07-16 한국전자통신연구원 불법 위장 단말 식별 장치 및 방법
EP3076582A1 (fr) 2014-01-06 2016-10-05 Mitsubishi Electric Corporation Dispositif d'enregistrement de données embarquées, et système de gestion de données obtenues par capture d'images de l'intérieur d'un train
US20150215762A1 (en) 2014-01-24 2015-07-30 Qualcomm Incorporated Method and apparatus for verifying the identity of a wireless device
US10495759B2 (en) 2014-02-13 2019-12-03 The Mitre Corporation GPS spoofing detection techniques
US9557402B2 (en) 2014-03-03 2017-01-31 Rosemount Inc. Indoor positioning system
US9468029B2 (en) 2014-03-10 2016-10-11 Belkin International Inc. Unifying multiple wireless networks
US9258713B2 (en) 2014-05-15 2016-02-09 Cisco Technology, Inc. Rogue wireless beacon device detection
US9408036B2 (en) 2014-05-15 2016-08-02 Cisco Technology, Inc. Managing wireless beacon devices
EP3161503A1 (fr) 2014-06-24 2017-05-03 HERE Global B.V. Estimation d'un niveau pour un ensemble de données d'observation
US9560143B2 (en) 2014-06-27 2017-01-31 Intel Corporation System and method for automatic session data transfer between computing devices based on zone transition detection
KR102210701B1 (ko) 2014-08-29 2021-02-02 삼성전자주식회사 비콘 관리 방법, 단말, 서버 및 저장 매체
CN105516887B (zh) 2014-09-25 2019-03-26 阿里巴巴集团控股有限公司 基于蓝牙的定位方法及其装置
WO2016086993A1 (fr) 2014-12-04 2016-06-09 Here Global B.V. Prise en charge de l'assurance qualité d'un modèle radio
WO2016096010A1 (fr) 2014-12-18 2016-06-23 Here Global B.V. Contrôle de l'état de santé de données de modèles radio
US9838879B2 (en) 2014-12-19 2017-12-05 Telefonaktiebolaget Lm Ericsson (Publ) Network node and method for detecting false base stations
WO2016140969A2 (fr) 2015-03-02 2016-09-09 Locus Solutions, Llc Systèmes et procédés pour surveiller des articles transportés
CN107431995B (zh) 2015-03-17 2020-08-28 赫尔环球有限公司 实现对移动装置的估计位置的验证
US10149159B1 (en) 2015-03-19 2018-12-04 Proxidyne, Inc. Trusted beacon system and method
EP3275254B1 (fr) 2015-03-27 2019-02-13 PCMS Holdings, Inc. Système et procédé d'intérieur localisation utilisant balises
US9867039B2 (en) 2015-06-26 2018-01-09 Futurewei Technologies, Inc. System and method for faked base station detection
US9955316B2 (en) 2015-07-20 2018-04-24 Blackberry Limited Indoor positioning systems and meeting room occupancy
US9301100B1 (en) 2015-07-20 2016-03-29 Blackberry Limited Indoor positioning systems and wireless fingerprints
US9544798B1 (en) 2015-07-23 2017-01-10 Qualcomm Incorporated Profiling rogue access points
US9654934B2 (en) 2015-08-11 2017-05-16 International Business Machines Corporation Detection of unauthorized wireless personal area network low energy devices
US20170068902A1 (en) 2015-09-03 2017-03-09 Skytree, Inc. Modeling of Geospatial Location Over Time
US20170078851A1 (en) 2015-09-11 2017-03-16 Qualcomm Incorporated Associating a signal observation with a location tag
US9849978B1 (en) 2015-09-25 2017-12-26 Amazon Technologies, Inc. Detecting of navigation data spoofing based on sensor data
US10628902B2 (en) 2015-10-07 2020-04-21 Q Link Wireless, LLC Deployable kiosk for providing data input and verification
US20170142684A1 (en) 2015-11-17 2017-05-18 Samsung Electronics Co., Ltd. Method and apparatus for determining position of a user equipment
CN108293238B (zh) 2015-11-19 2022-07-05 香港科技大学 促进接入点信号变更下的室内定位和指纹更新
WO2017100686A1 (fr) 2015-12-11 2017-06-15 Patrocinium Systems, Llc Systèmes et procédés de localisation basée sur une balise sécurisée
US20170238146A1 (en) * 2016-02-16 2017-08-17 Aisle411, Inc. Systems and Methods for Improving Indoor Position Detection
EP3443376B1 (fr) 2016-04-15 2020-09-16 Denso Corporation Système pour établir un emplacement en temps réel
KR102461141B1 (ko) 2016-04-25 2022-10-31 삼성전자주식회사 기지국 유효성 판단 방법 및 이를 지원하는 전자 장치
GB2549983A (en) 2016-05-06 2017-11-08 Here Global Bv Improving a positioning performance
US11057398B2 (en) 2016-06-30 2021-07-06 Fortinet, Inc. Detecting poisoning attacks of internet of things (IOT) location beacons in wireless local area networks (WLANS) with silence periods
US10511392B2 (en) 2016-10-14 2019-12-17 Board Of Regents, The University Of Texas System Systems, methods, and computer programs for wireless local area network localization
CN106597363A (zh) 2016-10-27 2017-04-26 中国传媒大学 一种室内wlan环境下的行人定位方法
US10397739B2 (en) 2017-03-03 2019-08-27 Here Global B.V. Supporting the creation of a radio map
US11546720B2 (en) 2017-03-21 2023-01-03 HERE Gloabl B.V. Supporting a tracking of mobile devices
WO2018177511A1 (fr) 2017-03-28 2018-10-04 Telefonaktiebolaget Lm Ericsson (Publ) Procédé de déploiement d'un nœud
US10477609B2 (en) 2017-06-02 2019-11-12 Apple Inc. Healing a radio map
EP3410156A1 (fr) 2017-06-02 2018-12-05 Nokia Technologies Oy Vérification d'informations de positionnement
KR101999148B1 (ko) 2017-07-28 2019-07-11 (주)씨드젠 로그 ap 탐지 시스템 및 방법과, 이를 위한 사용자 단말 및 컴퓨터 프로그램
US10470052B2 (en) 2017-11-13 2019-11-05 Common Networks, Inc. Systems and methods for configuring radio communication devices
US11363557B2 (en) 2017-12-01 2022-06-14 Nec Corporation Of America Detection of mobile transmitters in an office environment
US10789364B2 (en) 2018-05-02 2020-09-29 Nxp B.V. Method for providing an authenticated update in a distributed network
US10841746B2 (en) * 2018-06-07 2020-11-17 UST Global (Singapore) Pte. Ltd. Group travel and map integration tool for online and offline connectivity and location tracking in real time
US10531423B1 (en) 2018-06-14 2020-01-07 Microsoft Technology Licensing, Llc Distributed location determination in wireless networks
US11076300B2 (en) 2018-07-09 2021-07-27 Here Global B.V. Determining a plurality of potential installation positions
US10382890B1 (en) * 2018-07-26 2019-08-13 Bluedot Innovation Pty Ltd Cacheable geographic pages
US10999299B2 (en) 2018-10-09 2021-05-04 Uber Technologies, Inc. Location-spoofing detection system for a network service
EP3671253A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Crowd-sourcing de signaux radio potentiellement manipulés et/ou de paramètres de signal radio
EP3672310A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Identification de signaux radio et/ou de paramètres de signal radio potentiellement manipulés sur la base d'informations de carte radio
EP3672304A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Analyse statistique de fausses correspondances pour détection de mystification
EP3672305B1 (fr) 2018-12-20 2023-10-25 HERE Global B.V. Activation de fourniture flexible de données de signature de données de position représentant une position estimée
EP3671251A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Collecte d'une base de données de dispositifs usurpés
EP3672311A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Apprentissage d'un positionnement manipulé centré sur un dispositif
EP3672185A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Identification de signaux radio et/ou de paramètres de signal radio potentiellement manipulés
EP3671252A1 (fr) 2018-12-20 2020-06-24 HERE Global B.V. Identification de signaux radio et/ou de paramètres de signal radio potentiellement manipulés sur la base de premières informations de carte radio et de secondes informations de carte radio

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060240840A1 (en) * 2005-02-22 2006-10-26 Skyhook Wireless, Inc. Continuous data optimization by filtering and positioning systems
US20130310068A1 (en) * 2012-05-21 2013-11-21 Qualcomm Incorporated Radio frequency interference awareness assistance data
US20180219869A1 (en) * 2014-06-13 2018-08-02 Philips Lighting Holding B.V. Localization based on network of wireless nodes

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3902341A1 (fr) * 2020-04-22 2021-10-27 HERE Global B.V. Génération de carte radio pour déplacer des sites
CN112650088A (zh) * 2020-09-03 2021-04-13 南京煜耀智能科技有限公司 一种基于SaaS平台智能水电控制系统

Also Published As

Publication number Publication date
US20200200864A1 (en) 2020-06-25
US11480652B2 (en) 2022-10-25

Similar Documents

Publication Publication Date Title
US11480652B2 (en) Service for real-time spoofing/jamming/meaconing warning
US11221389B2 (en) Statistical analysis of mismatches for spoofing detection
US11363462B2 (en) Crowd-sourcing of potentially manipulated radio signals and/or radio signal parameters
US11408972B2 (en) Device-centric learning of manipulated positioning
EP3594711B1 (fr) Détermination d'une pluralité de positions d'installation potentielles
US10942245B2 (en) Identifying potentially manipulated radio signals and/or radio signal parameters based on a first radio map information and a second radio map information
US11350281B2 (en) Identifying potentially manipulated radio signals and/or radio signal parameters based on radio map information
US10935627B2 (en) Identifying potentially manipulated radio signals and/or radio signal parameters
US11480647B2 (en) Collecting a database of spoofed devices
US11226391B2 (en) Floor levels of a venue
US20200128369A1 (en) Controlling radio fingerprint observation report collection
WO2019228630A1 (fr) Collecte ou déclenchement de données de positionnement de collecte pour la mise à jour et/ou la génération d'une carte de positionnement
US20220312147A1 (en) Proximity-based offline geofencing
US10827452B2 (en) Trustworthiness of location estimates
US9900749B1 (en) Detection of infrastructure changes in opportunity signal data
EP3699644A1 (fr) Utilisation d'environnements radio modifiés dynamiquement et cartes radio
EP3672309B1 (fr) Activation de la reconnaissance de manipulation de données de position
EP3663788A1 (fr) Positionnement sensible à la confidentialité
EP3721249A1 (fr) Positionnement de dispositifs à faible capacité dans des systèmes de positionnement en intérieur

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20201223

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20210630

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS